CN107239680B - A kind of couple of user logs in the method and device for carrying out risk assessment - Google Patents

A kind of couple of user logs in the method and device for carrying out risk assessment Download PDF

Info

Publication number
CN107239680B
CN107239680B CN201710362096.XA CN201710362096A CN107239680B CN 107239680 B CN107239680 B CN 107239680B CN 201710362096 A CN201710362096 A CN 201710362096A CN 107239680 B CN107239680 B CN 107239680B
Authority
CN
China
Prior art keywords
user
currently
attribute field
logged
logs
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710362096.XA
Other languages
Chinese (zh)
Other versions
CN107239680A (en
Inventor
王嘉伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weimeng Chuangke Network Technology China Co Ltd
Original Assignee
Weimeng Chuangke Network Technology China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weimeng Chuangke Network Technology China Co Ltd filed Critical Weimeng Chuangke Network Technology China Co Ltd
Priority to CN201710362096.XA priority Critical patent/CN107239680B/en
Publication of CN107239680A publication Critical patent/CN107239680A/en
Application granted granted Critical
Publication of CN107239680B publication Critical patent/CN107239680B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2216/00Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F16/00 and subgroups
    • G06F2216/03Data mining

Abstract

The embodiment of the present invention provides a kind of couple of user and logs in the method and device for carrying out risk assessment, which comprises obtains the daily record data that user currently logs in;According to the daily record data that the user currently logs in, the attribute field information that user's unique identities mark UID and user currently log in is obtained;According to the UID of acquisition, the corresponding pre-set user model of UID is obtained from database, is stored with the corresponding several attribute fields of UID in the pre-set user model;The respective attributes field in attribute field information and the pre-set user model currently logged in using the user, obtains the risk factor that the user currently logs in;The risk factor currently logged according to the user currently logs in the user and carries out risk assessment.Above-mentioned technical proposal has the following beneficial effects: the user model for only each user that database needs to store, and required memory space greatly reduces, and the big speed raising of process of risk assessment, also achieves the risk assessment and judgement of automation.

Description

A kind of couple of user logs in the method and device for carrying out risk assessment
Technical field
The method and dress for carrying out risk assessment are logged in the present invention relates to network technique field more particularly to a kind of couple of user It sets.
Background technique
User logs in: large-scale website can have many consumers, and user is in order to use required for oneself account on website The operation of confirmation identity is called login.
It logs in and contains many information in log, such as login time, login mode, logging device, entry address, login browsing Device, logging request duration, login result, the information such as login account.The log-on message of same account is stored entirely in database In.When users log on, log is taken in lane database, then compares the current log for logging in log and taking-up one by one.And according to this Whether abnormal determine this time to log in.
The prior art stores its all login log by table name of A in the database for account A.Every time when A is logged in When, all logs are taken out from database, and word for word section compares one by one by this log L and database journal.To each field A critical value (C1, C2, C3 ...) is set, when the ratio that a field in L occurs in database journal corresponding field is low When critical value, this field is determined as exception.All fields are so judged, if the ratio that abnormal field accounts for field sum is high It is then this time logged in when total critical value C and is determined as exception.
Prior art needs take out all logs from database, this is that can not connect for the website of huge account system It receives, it is extremely time-consuming because operating thus.It is also very time-consuming that all logs are needed to be traversed in decision process.And the method excessively relies on The critical value (C, C1, C2 ...) of artificial settings, causes the degree of automation not high enough, responds not prompt enough.
Summary of the invention
The embodiment of the present invention provides a kind of couple of user and logs in the method and device for carrying out risk assessment, to accelerate user to log in The speed of risk assessment, while improving the degree of automation that user logs in risk assessment.
On the one hand, the method for carrying out risk assessment, the method packet are logged in the embodiment of the invention provides a kind of couple of user It includes:
Obtain the daily record data that user currently logs in;
According to the daily record data that the user currently logs in, obtains user's unique identities mark UID and user currently logs in Attribute field information;
According to the UID of acquisition, the corresponding pre-set user model of the UID, the default use are obtained from database The corresponding several attribute fields of the UID are stored in the model of family;
The respective attributes field in attribute field information and the pre-set user model currently logged in using the user, Obtain the risk factor that the user currently logs in;
The risk factor currently logged according to the user currently logs in the user and carries out risk assessment.
On the other hand, the device for carrying out risk assessment, described device are logged in the embodiment of the invention provides a kind of couple of user Include:
Daily record data acquiring unit, the daily record data currently logged in for obtaining user;
Attribute field acquiring unit, the daily record data for currently being logged according to the user obtain user's unique identities The attribute field information that mark UID and user currently log in;
It is corresponding pre- to obtain the UID for the UID according to acquisition from database for user model acquiring unit If user model, the corresponding several attribute fields of the UID are stored in the pre-set user model;
Risk factor acquiring unit, attribute field information and the pre-set user for currently being logged in using the user Respective attributes field in model obtains the risk factor that the user currently logs in;
Risk assessment unit, the risk factor for currently being logged according to the user currently log in progress to the user Risk assessment.
Above-mentioned technical proposal has the following beneficial effects: the user's mould for only each user that database needs to store Type, required memory space greatly reduce, and the big speed raising of process of risk assessment, also achieve the risk of automation Assessment and judgement.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is that a kind of couple of user of the embodiment of the present invention logs in the method flow diagram for carrying out risk assessment;
Fig. 2 is that a kind of couple of user of the embodiment of the present invention logs in the apparatus structure schematic diagram for carrying out risk assessment;
Fig. 3 is that another kind of the embodiment of the present invention logs in the apparatus structure schematic diagram for carrying out risk assessment to user.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, logging in the method flow diagram for carrying out risk assessment, the side for a kind of couple of user of the embodiment of the present invention Method includes:
101, the daily record data that user currently logs in is obtained;
102, the daily record data currently logged according to the user, obtains user's unique identities mark UID and user is current The attribute field information of login;
103, according to the UID of acquisition, the corresponding pre-set user model of the UID is obtained from database, it is described pre- If being stored with the corresponding several attribute fields of the UID in user model;
104, the respective attributes in attribute field information and the pre-set user model currently logged in using the user Field obtains the risk factor that the user currently logs in;
105, the risk factor currently logged according to the user currently logs in the user and carries out risk assessment.
Preferably, the attribute field includes one of following or any combination: when logentry, logging device, login Between, login mode, entry address, log in browser, logging request duration, login result, login account.
Preferably, each attribute that each attribute field includes also is stored in the corresponding pre-set user model of the UID Field sorting item and its rate of specific gravity.
Preferably, the phase in the attribute field information currently logged in using the user and the pre-set user model Attribute field is answered, the risk factor that the user currently logs in is obtained, comprising:
For each attribute field information that the user currently logs in, in the respective attributes of the pre-set user model Corresponding attribute field sorting item and its rate of specific gravity are searched in field, using the rate of specific gravity found divided by the pre-set user mould The sum of the rate of specific gravity for all properties field sorting item that respective attributes field in type includes, obtains the attribute field sorting item Score;
Calculate point for the corresponding each attribute field sorting item of all properties field information that the user currently logs in Number average value, the risk factor which is currently logged in as the user.
Preferably, the method also includes: the daily record data currently logged according to the user is to corresponding in database Pre-set user model is updated, comprising: the attribute field information currently logged according to the user is in the pre-set user mould Corresponding attribute field sorting item and its rate of specific gravity are searched in the respective attributes field of type, the rate of specific gravity found are added 1, and will The rate of specific gravity for all properties field sorting item that the respective attributes field includes is multiplied by preset weight coefficient.
Corresponding to above method embodiment, commented as shown in Fig. 2, being logged in for a kind of couple of user of the embodiment of the present invention and carrying out risk The apparatus structure schematic diagram estimated, described device include:
Daily record data acquiring unit 21, the daily record data currently logged in for obtaining user;
Attribute field acquiring unit 22, the daily record data for currently being logged according to the user obtain the unique body of user The attribute field information that part mark UID and user currently log in;
It is corresponding to obtain the UID for the UID according to acquisition from database for user model acquiring unit 23 Pre-set user model is stored with the corresponding several attribute fields of the UID in the pre-set user model;
Risk factor acquiring unit 24, attribute field information and the default use for currently being logged in using the user Respective attributes field in the model of family obtains the risk factor that the user currently logs in;
Risk assessment unit 25, the risk factor for currently being logged according to the user currently log into the user Row risk assessment.
Preferably, the attribute field includes one of following or any combination: when logentry, logging device, login Between, login mode, entry address, log in browser, logging request duration, login result, login account.
Preferably, each attribute that each attribute field includes also is stored in the corresponding pre-set user model of the UID Field sorting item and its rate of specific gravity.
Preferably, the risk factor acquiring unit 24, specifically for each category currently logged in for the user Property field information, searches corresponding attribute field sorting item and its specific gravity in the respective attributes field of the pre-set user model Value, all properties field point for including divided by the respective attributes field in the pre-set user model using the rate of specific gravity found The sum of rate of specific gravity of category obtains the score of the attribute field sorting item;Calculate all properties that the user currently logs in The score average of the corresponding each attribute field sorting item of field information, the score average is current as the user The risk factor of login.
Preferably, as shown in figure 3, logging in the apparatus structure for carrying out risk assessment to user for another kind of the embodiment of the present invention Schematic diagram, described device further include: user model updating unit 26, the daily record data pair for currently being logged according to the user Corresponding pre-set user model is updated in database, specifically for the attribute field information currently logged according to the user Corresponding attribute field sorting item and its rate of specific gravity are searched in the respective attributes field of the pre-set user model, will be found Rate of specific gravity add 1, and the rate of specific gravity for all properties field sorting item for including by the respective attributes field is multiplied by preset weight Coefficient.
Above-mentioned technical proposal has the following beneficial effects: the user's mould for only each user that database needs to store Type, required memory space greatly reduce, and the big speed raising of process of risk assessment, also achieve the risk of automation Assessment and judgement.
The embodiment of the present invention is described in detail below by way of application example:
We cannot all take log in the account system of large-scale website, improve the speed judged to method And accuracy, and also to promote the degree of automation.Therefore the resulting user model of refined data is a choosing well It selects.
Application example of the present invention constructs the user model that user's unique identities mark (UID) is major key for each user And it is stored in database profession.User model is constantly in variation.All the time all in the login log of the streaming of generation, through sieving Choosing, which generates, logs in log, and according to certain algorithm, can use user model and when time logon data carrys out more new model.When having When needing to judge whether it is the logon data that malice logs in, read user model from lane database and according to user model and Data obtain judging result according to certain mathematical programming operation.
If logging in has UID and this logentry logged in, the attribute that two users of logging device currently log in log Field information.Then the structure of user model can be such structure:
This is a possible structure of user model.Store UID first, the corresponding pre-set user model of the UID In be also stored with each attribute field sorting item and its rate of specific gravity that each attribute field includes.In entry (entrance) Xiang Licun Storing up used each logentry and its rate of specific gravity, (rate of specific gravity that such as mailbox logs in is 32.2, and the specific gravity for using app to log in Value is only 0.6).Next the facility information and its rate of specific gravity logged in recently is stored.
How such user model is constructed? convection type logs in Log Filter, qualified logon data quilt first Write as the form of { UID:23142, entry:mail, device:pc }.Then according to the pre-set user in UID reading database Model creates if Non-precondition user model.If this entry logged in is mail, then the entry in pre-set user model In the value of mail add 1 (no then newly-built mail:1), then again to all values in entry multiplied by 0.995 (weight coefficient); This step is the importance for the login for making user nearest greater than login a long time ago, and also has control data scale Effect.Device is handled in this approach, then stores pre-set user model to database, completes to update operation.
The method of risk assessment: the daily record data currently logged according to user obtains user's unique identities mark UID and use The data to be assessed are write as { UID:23142, entry:app, device:Galaxy by the attribute field information that family currently logs in S7 } form.UID corresponding pre-set user model (such as above-mentioned pre-set user model, the default use are read from lane database The corresponding several attribute fields of the UID are stored in the model of family);The attribute field information that is currently logged in using the user and Respective attributes field in the pre-set user model obtains the risk factor that the user currently logs in: to entry field ratio Right: the entry specifically logged in is app, then the corresponding rate of specific gravity 0.6 of app is found in entry, pre-set user model, then use 0.6 divided by rates of specific gravity all under entry sum: 0.6/ (32.2+2.1+0.6)=0.0017 (point).It is current to calculate the user The score average of the corresponding attribute field sorting item of all properties field information of login, using the score average as described in The risk factor that user currently logs in: same operation is done to device and obtains entry score: 40.4/ (75.9+40+ 40.4) risk factor for=0.2584 (point), then currently logging in the average value of all scores as the user (0.1301).Finally, the risk factor currently logged according to the user, which currently logs in the user, carries out risk assessment: wind Dangerous coefficient is bigger closer to 0 risk, conversely, the more big then risk of risk factor is smaller.
Due to streaming log speed quickly, measure very big, the model of each user will be a gradually perfect process, mould The time that type is established is longer, then risk assessment is more accurate.
Application example technical solution bring of the present invention is the utility model has the advantages that in the method, database needs store only It is the user model of each user, required memory space greatly reduces, and the big speed raising of process of risk assessment, also Realize the risk assessment and judgement of automation.
It should be understood that the particular order or level of the step of during disclosed are the examples of illustrative methods.Based on setting Count preference, it should be appreciated that in the process the step of particular order or level can be in the feelings for the protection scope for not departing from the disclosure It is rearranged under condition.Appended claim to a method is not illustratively sequentially to give the element of various steps, and not It is to be limited to the particular order or level.
In above-mentioned detailed description, various features are combined together in single embodiment, to simplify the disclosure.No This published method should be construed to reflect such intention, that is, the embodiment of theme claimed needs to compare The more features of the feature clearly stated in each claim.On the contrary, as appended claims is reflected Like that, the present invention is in the state fewer than whole features of disclosed single embodiment.Therefore, appended claims It is hereby expressly incorporated into detailed description, wherein each claim is used as alone the individual preferred embodiment of the present invention.
For can be realized any technical staff in the art or using the present invention, above to disclosed embodiment into Description is gone.To those skilled in the art;The various modifications mode of these embodiments will be apparent from, and this The General Principle of text definition can also be suitable for other embodiments on the basis of not departing from the spirit and scope of the disclosure. Therefore, the disclosure is not limited to embodiments set forth herein, but most wide with principle disclosed in the present application and novel features Range is consistent.
Description above includes the citing of one or more embodiments.Certainly, in order to describe above-described embodiment and description portion The all possible combination of part or method is impossible, but it will be appreciated by one of ordinary skill in the art that each implementation Example can do further combinations and permutations.Therefore, embodiment described herein is intended to cover fall into the appended claims Protection scope in all such changes, modifications and variations.In addition, with regard to term used in specification or claims The mode that covers of "comprising", the word is similar to term " includes ", just as " including " solved in the claims as transitional word As releasing.In addition, the use of any one of specification in claims term "or" being to indicate " non-exclusionism Or ".
Those skilled in the art will also be appreciated that the various illustrative components, blocks that the embodiment of the present invention is listed (illustrative logical block), unit and step can by electronic hardware, computer software, or both knot Conjunction is realized.For the replaceability (interchangeability) for clearly showing that hardware and software, above-mentioned various explanations Property component (illustrative components), unit and step universally describe their function.Such function It can be that the design requirement for depending on specific application and whole system is realized by hardware or software.Those skilled in the art Can be can be used by various methods and realize the function, but this realization is understood not to for every kind of specific application Range beyond protection of the embodiment of the present invention.
Various illustrative logical blocks or unit described in the embodiment of the present invention can by general processor, Digital signal processor, specific integrated circuit (ASIC), field programmable gate array or other programmable logic devices, discrete gate Or transistor logic, discrete hardware components or above-mentioned any combination of design carry out implementation or operation described function.General place Managing device can be microprocessor, and optionally, which may be any traditional processor, controller, microcontroller Device or state machine.Processor can also be realized by the combination of computing device, such as digital signal processor and microprocessor, Multi-microprocessor, one or more microprocessors combine a digital signal processor core or any other like configuration To realize.
The step of method described in the embodiment of the present invention or algorithm can be directly embedded into hardware, processor execute it is soft The combination of part module or the two.Software module can store in RAM memory, flash memory, ROM memory, EPROM storage Other any form of storaging mediums in device, eeprom memory, register, hard disk, moveable magnetic disc, CD-ROM or this field In.Illustratively, storaging medium can be connect with processor, so that processor can read information from storaging medium, and It can be to storaging medium stored and written information.Optionally, storaging medium can also be integrated into the processor.Processor and storaging medium can To be set in asic, ASIC be can be set in user terminal.Optionally, processor and storaging medium also can be set in In different components in the terminal of family.
In one or more exemplary designs, above-mentioned function described in the embodiment of the present invention can be in hardware, soft Part, firmware or any combination of this three are realized.If realized in software, these functions be can store and computer-readable On medium, or it is transferred on a computer readable medium in the form of one or more instructions or code forms.Computer readable medium includes electricity Brain storaging medium and convenient for so that computer program is allowed to be transferred to from a place telecommunication media in other places.Storaging medium can be with It is that any general or special computer can be with the useable medium of access.For example, such computer readable media may include but It is not limited to RAM, ROM, EEPROM, CD-ROM or other optical disc storages, disk storage or other magnetic storage devices or other What can be used for carry or store with instruct or data structure and it is other can be by general or special computer or general or specially treated The medium of the program code of device reading form.In addition, any connection can be properly termed computer readable medium, example Such as, if software is to pass through a coaxial cable, fiber optic cables, double from a web-site, server or other remote resources Twisted wire, Digital Subscriber Line (DSL) are defined with being also contained in for the wireless way for transmitting such as example infrared, wireless and microwave In computer readable medium.The disk (disk) and disk (disc) includes compress disk, radium-shine disk, CD, DVD, floppy disk And Blu-ray Disc, disk is usually with magnetic replicate data, and disk usually carries out optically replicated data with laser.Combinations of the above Also it may be embodied in computer readable medium.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention Protection scope, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include Within protection scope of the present invention.

Claims (6)

1. a kind of couple of user logs in the method for carrying out risk assessment, which is characterized in that the described method includes:
Obtain the daily record data that user currently logs in;
According to the daily record data that the user currently logs in, the category that user's unique identities mark UID and user currently log in is obtained Property field information;
According to the UID of acquisition, the corresponding pre-set user model of the UID, the pre-set user mould are obtained from database Each attribute field sorting item that the corresponding several attribute fields of the UID and each attribute field include is stored in type And its rate of specific gravity;
The respective attributes field in attribute field information and the pre-set user model currently logged in using the user is obtained The risk factor that the user currently logs in;
The risk factor currently logged according to the user currently logs in the user and carries out risk assessment;
Wherein, the respective attributes in the attribute field information currently logged in using the user and the pre-set user model Field obtains the risk factor that the user currently logs in, comprising:
For each attribute field information that the user currently logs in, in the respective attributes field of the pre-set user model It is middle to search corresponding attribute field sorting item and its rate of specific gravity, using the rate of specific gravity found divided by the pre-set user model The respective attributes field all properties field sorting item that includes the sum of rate of specific gravity, obtain point of the attribute field sorting item Number;
The score for calculating the corresponding each attribute field sorting item of all properties field information that the user currently logs in is flat Mean value, the risk factor which is currently logged in as the user.
2. the method for carrying out risk assessment is logged in user as described in claim 1, which is characterized in that the attribute field includes One of following or any combination: logentry, logging device, login time, login mode, entry address, log in browser, Logging request duration, login result, login account.
3. the method for carrying out risk assessment is logged in user as described in claim 1, which is characterized in that the method also includes:
The daily record data currently logged according to the user is updated pre-set user model corresponding in database, specific to wrap Include: the attribute field information currently logged according to the user is searched pair in the respective attributes field of the pre-set user model The rate of specific gravity found is added 1, and owned what the respective attributes field included by the attribute field sorting item and its rate of specific gravity answered The rate of specific gravity of attribute field sorting item is multiplied by preset weight coefficient.
4. a kind of couple of user logs in the device for carrying out risk assessment, which is characterized in that described device includes:
Daily record data acquiring unit, the daily record data currently logged in for obtaining user;
Attribute field acquiring unit, the daily record data for currently being logged according to the user obtain user's unique identities mark The attribute field information that UID and user currently log in;
User model acquiring unit obtains the corresponding default use of the UID for the UID according to acquisition from database Family model is stored with the corresponding several attribute fields of the UID and each attribute field packet in the pre-set user model Each attribute field sorting item and its rate of specific gravity included;
Risk factor acquiring unit, attribute field information and the pre-set user model for currently being logged in using the user In respective attributes field, obtain the risk factor that the user currently logs in;
Risk assessment unit, the risk factor for currently being logged according to the user, which currently logs in the user, carries out risk Assessment;
Wherein, the risk factor acquiring unit is believed specifically for each attribute field currently logged in for the user Breath, searches corresponding attribute field sorting item and its rate of specific gravity in the respective attributes field of the pre-set user model, uses The all properties field sorting item that the rate of specific gravity found includes divided by the respective attributes field in the pre-set user model The sum of rate of specific gravity obtains the score of the attribute field sorting item;Calculate all properties field letter that the user currently logs in The score average for ceasing corresponding each attribute field sorting item, which is currently logged in as the user Risk factor.
5. the device for carrying out risk assessment is logged in user as claimed in claim 4, which is characterized in that the attribute field includes One of following or any combination: logentry, logging device, login time, login mode, entry address, log in browser, Logging request duration, login result, login account.
6. the device for carrying out risk assessment is logged in user as claimed in claim 4, which is characterized in that described device further include:
User model updating unit, the daily record data for currently being logged according to the user is to default use corresponding in database Family model is updated, specifically for the attribute field information that is currently logged according to the user in the pre-set user model Corresponding attribute field sorting item and its rate of specific gravity are searched in respective attributes field, the rate of specific gravity found is added 1, and by the phase The rate of specific gravity for all properties field sorting item for answering attribute field to include is multiplied by preset weight coefficient.
CN201710362096.XA 2017-05-22 2017-05-22 A kind of couple of user logs in the method and device for carrying out risk assessment Active CN107239680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710362096.XA CN107239680B (en) 2017-05-22 2017-05-22 A kind of couple of user logs in the method and device for carrying out risk assessment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710362096.XA CN107239680B (en) 2017-05-22 2017-05-22 A kind of couple of user logs in the method and device for carrying out risk assessment

Publications (2)

Publication Number Publication Date
CN107239680A CN107239680A (en) 2017-10-10
CN107239680B true CN107239680B (en) 2019-09-06

Family

ID=59984545

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710362096.XA Active CN107239680B (en) 2017-05-22 2017-05-22 A kind of couple of user logs in the method and device for carrying out risk assessment

Country Status (1)

Country Link
CN (1) CN107239680B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769005B (en) * 2018-05-25 2021-06-04 深圳市量智信息技术有限公司 WEB system of network space vulnerability merging platform
CN110166438B (en) * 2019-04-19 2022-03-18 平安科技(深圳)有限公司 Account information login method and device, computer equipment and computer storage medium
CN110493181B (en) * 2019-07-05 2023-04-07 中国平安财产保险股份有限公司 User behavior detection method and device, computer equipment and storage medium
CN111988278B (en) * 2020-07-23 2022-07-29 微梦创科网络科技(中国)有限公司 Abnormal user determination method and device based on user geographical location log

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101149829A (en) * 2006-09-22 2008-03-26 阿里巴巴公司 Client data centralized processing method and system
CN103581120A (en) * 2012-07-24 2014-02-12 阿里巴巴集团控股有限公司 Method and device for recognizing user risks
CN103886250A (en) * 2012-12-19 2014-06-25 中国移动通信集团甘肃有限公司 Data processing method, device, controller and system oriented to business support system
CN105528535A (en) * 2015-12-25 2016-04-27 北京奇虎科技有限公司 Log information based user behavior analysis method and apparatus
CN105763505A (en) * 2014-12-15 2016-07-13 阿里巴巴集团控股有限公司 Operation method and device based on user account
CN105809035A (en) * 2016-03-07 2016-07-27 南京邮电大学 Android application real-time behavior based malicious software detection method and system
CN105912729A (en) * 2016-05-19 2016-08-31 华南理工大学 Three-dimensional time sequence dynamic model based mobile phone game recommendation system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8402141B2 (en) * 2004-09-28 2013-03-19 International Business Machines Corporation Gracefully reestablishing an expired browser session

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101149829A (en) * 2006-09-22 2008-03-26 阿里巴巴公司 Client data centralized processing method and system
CN103581120A (en) * 2012-07-24 2014-02-12 阿里巴巴集团控股有限公司 Method and device for recognizing user risks
CN103886250A (en) * 2012-12-19 2014-06-25 中国移动通信集团甘肃有限公司 Data processing method, device, controller and system oriented to business support system
CN105763505A (en) * 2014-12-15 2016-07-13 阿里巴巴集团控股有限公司 Operation method and device based on user account
CN105528535A (en) * 2015-12-25 2016-04-27 北京奇虎科技有限公司 Log information based user behavior analysis method and apparatus
CN105809035A (en) * 2016-03-07 2016-07-27 南京邮电大学 Android application real-time behavior based malicious software detection method and system
CN105912729A (en) * 2016-05-19 2016-08-31 华南理工大学 Three-dimensional time sequence dynamic model based mobile phone game recommendation system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
登录账号安全管理;阎焯;《计算机光盘软件与应用》;20120708(第13期);30-32

Also Published As

Publication number Publication date
CN107239680A (en) 2017-10-10

Similar Documents

Publication Publication Date Title
CN107239680B (en) A kind of couple of user logs in the method and device for carrying out risk assessment
JP5443513B2 (en) Method and system for handling cookies across domains
CN103297435B (en) A kind of abnormal access behavioral value method and system based on WEB daily record
CN103647800B (en) Recommend the method and system of application resource
CN105138555B (en) A kind of multilingual international loading method of webpage and device
CN106302534B (en) A kind of method and system of detection and processing illegal user
CN109687991A (en) User behavior recognition method, apparatus, equipment and storage medium
CN107122377A (en) Automatic Adaptation Data collection and storage assembly
CN106339469A (en) Method and device for recommending data
CN107070940B (en) Method and device for judging malicious login IP address from streaming login log
CN102640144A (en) Processes and systems for collaborative manipulation of data
CN102316167B (en) Website recommending method, system thereof and network server
CN109040073A (en) A kind of detection method, device, medium and the equipment of the access of WWW abnormal behaviour
CN103780625B (en) User interest finds method and apparatus
CN108734510B (en) Advertisement recommendation method and system based on attribute matching
CN109388614A (en) A kind of method, system and the equipment of catalogue file number quota
CN110138747A (en) A kind of method and system for verifying account logging state
CN107729375A (en) A kind of method and device of daily record data sequence
CN109376192A (en) A kind of user retains analysis method, device, electronic equipment and storage medium
CN109325171A (en) User interest analysis method and system based on domain knowledge
CN107807793B (en) The storage of data copy isomery and access method in distributed computer storage system
CN104753758B (en) A kind of information attribute recognition methods and device
CN107707621A (en) A kind of method and device for realizing intelligent buffer
CN106650414B (en) User authority management method and system
CN108897886A (en) Page display method calculates equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant